On Mon, Apr 24, 2017 at 01:40:56PM -0700, Kees Cook wrote: > I think we're way off in the weeds here. The "cannot inc from 0" check > is about general sanity checks on refcounts. I disagree, although sanity check are good too. > It should never happen, and if it does, there's a bug. The very same is true of the overflow thing. > However, what the refcount hardening protection is trying to do is > protect again the exploitable condition: overflow. Sure.. > Inc-from-0 isn't an exploitable condition since in theory > the memory suddenly becomes correctly managed again. It does not. It just got free'ed. Nothing will stop the free from happening (or already having happened). > We're just discussing different things. No, both are bugs, neither overflow not inc-from-zero _should_ happen. The whole point is that code is buggy. If it weren't for that, we'd not be doing this. How is the below not useful fodder for an exploit? It might be a less common bug, and perhaps a bit more fiddly to make work, but afaict its still a full use-after-free and therefore useful. --- Thread-A Thread-B if(dec_and_test(&obj->ref)) { // true, ref==0 inc(&obj->ref) // ref: 0->1 kfree(obj); } ~~~/ Thread-C /~~~ obj = kmalloc(); // is obj from Thread-A obj->ref = 1; obj->func = .... obj->func(); -- OR -- put(obj); if (dec_and_test(&obj->ref)) kfree(obj); // which was of Thread-C